I try to do arp-poisoning on my wireless network using ethercap (same method as using on wired). It make the victim network unusable rather than forward packet to attacker computer. Why ?
Asked
Active
Viewed 85 times
0
-
Now I find the solution. Put the NIC to monitor mode. Then I see all the packets in the air. – Isara Rungvitayakul Jul 18 '11 at 15:27
-
So the correct way to sniff in wireless is to put NIC into monitor mode and use wireshark or kismet to view the packet. – Isara Rungvitayakul Jul 27 '11 at 18:44
1 Answers
1
The ARP protocol uses brodcasts. WLAN will transfer these at it lowest speed - so that all stations can receive them - usually at 1 MBps. As a result the channel will simply be jammed with a relatively low amount of packets send per second. But ettercap need to send a reletively high amount of packets to do its work.
In conclusion, it may simply jam the channel.

Turbo J
- 503
- 2
- 8